University Library
  • Login
A gateway to Melbourne's research publications
Minerva Access is the University's Institutional Repository. It aims to collect, preserve, and showcase the intellectual output of staff and students of the University of Melbourne for a global audience.
View Item 
  • Minerva Access
  • Science
  • Information Systems
  • Information Systems - Theses
  • View Item
  • Minerva Access
  • Science
  • Information Systems
  • Information Systems - Theses
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

    Mitigating BYOD information security risks

    Thumbnail
    Download
    Mitigating BYOD Information Security Risks (679.2Kb)

    Citations
    Altmetric
    Author
    Arregui, Daniel
    Date
    2015
    Affiliation
    Information Systems
    Computing and Information Systems
    Metadata
    Show full item record
    Document Type
    Masters Coursework thesis
    Access Status
    Open Access
    URI
    http://hdl.handle.net/11343/56627
    Description

    © 2015 Daniel Alejandro Arregui

    Abstract
    BYOD is a trend in organizations to allow employees, contractors and suppliers to use their personal devices in the workplace. Users can access electronic organizational resources from their tablets, smartphones, laptops, etc. The benefits of allowing BYOD in organizations are convenient for both employees and organizations. Employees will feel more comfortable employing their personal devices and organizations will save resources that should be used to purchase of electronic equipment for their employees. However, the confidentiality, integrity and ability of the information are at risk because individuals will have access to it employing their personal devices. The challenge to organizations is to keep that information secure. While BYOD is a well-defined and accepted trend in several organizations, there is little documentation to address the information security risks posed by BYOD. The following research, in the form of an extensive literature review, has defined a comprehensive list of information security risks that are associated with allowing BYOD in the organizations. This list will be used to evaluate five BYOD policy documents from different organizations to determine how comprehensively BYOD information security risks are addressed. Based on this evaluation, it will be identified which BYOD information security risks have been acknowledged and addressed by these organizations.
    Keywords
    BYOD; security policy; BYOD issues and challenges; BYOD strategies; BYOD policies; bring your own device

    Export Reference in RIS Format     

    Endnote

    • Click on "Export Reference in RIS Format" and choose "open with... Endnote".

    Refworks

    • Click on "Export Reference in RIS Format". Login to Refworks, go to References => Import References


    Collections
    • Information Systems - Theses [33]
    • Computing and Information Systems - Theses [398]
    Minerva AccessDepositing Your Work (for University of Melbourne Staff and Students)NewsFAQs

    BrowseCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects
    My AccountLoginRegister
    StatisticsMost Popular ItemsStatistics by CountryMost Popular Authors